古语有云:“万恶毒为首”。我们身为祖国的花朵有责任担起拒绝毒品的重任。毒品能麻醉人体的神经中枢系统,大量吸食会导致死亡。那么毒品对我们来说,既熟悉又陌生。熟悉的是经过多方面的宣传,我们对毒品有了一定程度的认识;陌生的是没有尝试过毒品的滋味。不错,正是因为这一种好奇心,不少人成为了如恶魔般的毒品的奴隶。作为祖国未来栋梁的我们,不但要远离毒品,而且拒绝它。As the saying goes: "the evil poison led" We are the flowers of the motherland are heavy responsibility bear to reject Anesthesia drugs to the central nervous system of the human body, a lot of smoking will lead to So drugs for us, both familiar and Familiar with is through the various aspects of publicity, we have a certain degree of understanding of the drug; strange is not tried Well, it is because of this kind of curiosity, many people become a devilish drug As the future pillars of our country, not only to stay away from drugs, but also rejected
灰鸽子 病毒Gray is a well-known dove back Compared to the older ice, black, gray pigeon can be said to be the back door of the home are a combination of different The rich and powerful functionality and flexibility of operation, well hidden so that others are to be outshone by the back Client simple and convenient to operate so that the entry of just a beginner can act as When used in legal cases, the gray pigeon is a good remote control However, if some of it to do illegal things, gray pigeons have become very powerful hacking This is like powder, on various occasions, brought Gray dove to the complete presentation may be only a gray pigeon author to make it clear that we are here only for a Gray Pigeon client and server are based on the preparation of D Hackers use of the client to configure a server Can be configured to include information on the type of line (for example, wait for the connection or take the initiative to connect), take the initiative to connect using the public network IP (domain name), a password to connect, the use of the port, the start of the name, the name of the service, the process of hidden ways, the use of the Shell, agents, icons and so Server for the client to connect a variety of ways, making the environment in a variety of network users may be poisoning, including local area network users (Internet through a proxy), the public network and ADSL users to dial-up As the gray dove to intercept the API call, in the normal mode file server and its services are registered to hide, that is to say, even if you set up a "show all hidden files" do not see In addition, the gray-end services doves of the file name can be customized, hand-All this has brought about the detection of certain However, through careful observation, we found that the detection of gray pigeons still have to follow the From the above analysis we can see that principle to run, regardless of the custom server-side file name is what will normally be installed in the operating system directory in order to generate a "_dll" at the end of the Through this, we can more accurately detect the hand-gray-end services Due to the normal mode will hide their gray pigeons, so detection of gray pigeons must operate in a safe Into the safe mode is: Start the computer in the Windows system into the start screen, press the F8 key (or in your computer holding down the Ctrl key), in the event of the start-up options menu, select "Safe Mode" Or "Safe M" 1, dove gray as a result of the document itself has hidden attributes, so set Windows to show all Open "My Computer" menu, select "Tools" - "" Folder Options ", click" view "to remove" hide protected operating system files "before the Duigou, and the" hidden files and folders " Select the item "Show hidden files and folders," then click "OK" 2, open the Windows "search files", enter the file name "_dll", the search location to choose the Windows installation directory (for 98/xp default C: / windows, 2k/NT for the C: / Winnt) 3, after a search, we have Windows directory (does not contain a subdirectory), the discovery of a document Game_H 4, according to the analysis of the principle of gray pigeons, we know that if it is gray pigeons Game_HDLL documents, the operating system is installed in the directory will be Gxe and Gdll Open the Windows directory, there are really two documents at the same time there is a record for keyboard operation GameKdll After a few steps which we operate on the basic of these documents can be gray-end services doves of